Skip to content

highoncomputers/redhat

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

68 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Hackdroid - Ethical Hacking Toolkit for Android

Hackdroid is an Android-based ethical hacking and security testing toolkit designed for security professionals and non-coders alike. The app provides a simple button-based interface that automates command execution in the background, making security tools accessible without requiring command-line knowledge.

IMPORTANT: All 60+ security tools perform REAL network operations with actual API integrations, socket connections, and genuine scan results. No simulations or mockups.

Features

Simple Interface for Non-Coders

  • Button-based navigation - Just tap cards to access tool categories
  • Function key shortcuts - Press F1-F12 to instantly launch tools
  • Input dialogs with helpful hints and labels
  • Automated execution - Tools run in background with progress indicators
  • Detailed results - Findings displayed with severity levels and remediation suggestions

Real Network Operations

  • OkHttp 4.12.0 for HTTP/HTTPS connections
  • Java Socket for raw TCP port scanning and banner grabbing
  • InetAddress for DNS resolution
  • SSLContext for TLS/SSL certificate analysis
  • Kotlinx Coroutines for async non-blocking operations

External APIs (No Authentication Required)

  • Google DNS-over-HTTPS (dns.google) - DNS record enumeration
  • ip-api.com - IP geolocation with proxy/VPN detection
  • HackerTarget API - WHOIS lookups and subdomain discovery
  • crt.sh Certificate Transparency - SSL certificate log search
  • Wayback Machine (web.archive.org) - Historical URL discovery

Tool Categories

πŸ›‘οΈ Vulnerability Scanning (8 Tools)

Tool Key Description Real Operation
Port Scanner F1 Scan ports with service detection and banner grabbing TCP socket connections to each port
SSL/TLS Analyzer F2 Certificate validation, cipher analysis, protocol detection SSL handshake, certificate parsing
Security Headers F3 Analyze headers with security scoring HTTP HEAD/GET, header parsing
Common Vulns F4 Exposed files, admin panels, misconfigurations HTTP requests to 60+ paths
Tech Fingerprint F5 Detect CMS, frameworks, servers Response analysis, cookie inspection
WAF Detector F6 Identify Web Application Firewalls Header analysis, payload testing
Rate Limit Test F7 Test DoS protection Multiple rapid HTTP requests
security.txt F8 Security contact disclosure check HTTP to .well-known/security.txt

πŸ” OSINT Tools (10 Tools)

Tool Key Description Real Operation
DNS Enumeration F1 A, AAAA, MX, NS, TXT, SOA, SRV, DMARC records Google DNS-over-HTTPS API
Subdomain Finder F2 CT logs + DNS brute force + API crt.sh + HackerTarget + DNS
WHOIS Lookup F3 Domain registration info HackerTarget WHOIS API
IP Geolocation F4 Location, ISP, proxy/VPN detection ip-api.com JSON API
Email Analysis F5 MX, SPF, DMARC configuration DNS MX/TXT queries
Social Media OSINT F6 Check 20+ platforms for username HTTP HEAD requests
Wayback Machine F7 Historical archived URLs web.archive.org CDX API
robots.txt Analyzer F8 Find disallowed paths/sitemaps HTTP GET robots.txt
CT Logs F9 Certificate Transparency subdomains crt.sh JSON API
Host Information F10 IP info with open port detection ip-api.com + port scan

🌐 Web Attack Testing (9 Tools)

Tool Key Description Real Operation
SQL Injection F1 Error-based, UNION, time-based payloads HTTP with SQL payloads
XSS Scanner F2 Reflected XSS with filter bypass HTTP with XSS payloads
Dir Brute-force F3 Discover hidden directories/files HTTP to 70+ common paths
CSRF Check F4 Form token analysis HTML parsing for tokens
CORS Analyzer F5 Origin reflection testing Malicious Origin headers
HTTP Methods F6 Test dangerous methods PUT, DELETE, TRACE testing
LFI Scanner F7 Local File Inclusion testing Path traversal payloads
Open Redirect F8 URL redirect vulnerability testing Redirect payload testing
Clickjacking F9 Frame embedding protection check X-Frame-Options analysis

πŸ€– AI-Powered Analysis

  • Threat Level Calculation - Automatic risk assessment
  • Vulnerability Prediction - Based on detected technology stack
  • Attack Surface Analysis - Identify entry points and attack vectors
  • Remediation Suggestions - Code examples and configuration fixes
  • Attack Plan Generation - Step-by-step exploitation guidance

βš™οΈ Automation & Scheduling

  • Workflow Builder - Create custom tool chains
  • Scheduled Scans - Daily, weekly, monthly, or cron-based
  • Triggers - Automatic execution based on conditions
  • Background Execution - WorkManager integration

πŸ“± Termux Integration (50+ Tools)

  • Information Gathering - 15 tools (nmap, enum4linux, etc.)
  • Exploitation Tools - 5 tools (metasploit, exploit-db, etc.)
  • Phishing Analysis - 10 tools (social engineering toolkit)
  • Camera Security - 3 tools (RTSP scanners)
  • Social Media OSINT - 3 tools
  • SMS Analysis - 6 tools
  • Hash Tools - 4 tools (hash-identifier, hashcat)
  • XSS Attack Tools - 3 tools

Technical Implementation

Port Scanner

  • Concurrent scanning - Up to 20 parallel socket connections
  • Service detection - Maps ports to service names
  • Banner grabbing - FTP, SMTP, POP3, IMAP, HTTP banners
  • Common ports: 21, 22, 23, 25, 53, 80, 110, 143, 443, 445, 993, 995, 1433, 1521, 3306, 3389, 5432, 5900, 6379, 8080, 8443, 27017

SSL/TLS Analyzer

  • Certificate details - Subject, issuer, validity dates
  • Protocol analysis - TLS version detection
  • Cipher suite - Cipher strength analysis
  • Security checks - HTTPS redirect, HSTS, HSTS preload
  • Expiration warning - Alerts for soon-to-expire certificates

SQL Injection Scanner

  • Error-based detection - Database error pattern matching
  • UNION-based detection - Column count enumeration
  • Time-based blind - Response timing analysis
  • Database fingerprinting - MySQL, PostgreSQL, MSSQL, Oracle, SQLite

XSS Scanner

  • Reflected XSS - Direct payload reflection
  • DOM-based XSS - JavaScript sink analysis
  • Filter bypass - Encoding, case variation, event handlers

Project Structure

com.hack.droid/
β”œβ”€β”€ activities/           # 26 UI Activities
β”‚   β”œβ”€β”€ MainActivity.kt
β”‚   β”œβ”€β”€ VulnerabilityScanActivity.kt
β”‚   β”œβ”€β”€ OsintActivity.kt
β”‚   β”œβ”€β”€ WebAttackActivity.kt
β”‚   β”œβ”€β”€ ResultActivity.kt
β”‚   β”œβ”€β”€ HistoryActivity.kt
β”‚   β”œβ”€β”€ DashboardActivity.kt
β”‚   β”œβ”€β”€ AutomationActivity.kt
β”‚   └── ...
β”œβ”€β”€ adapters/             # RecyclerView Adapters
β”‚   β”œβ”€β”€ ToolAdapter.kt
β”‚   β”œβ”€β”€ ScanResultAdapter.kt
β”‚   └── FindingsAdapter.kt
β”œβ”€β”€ ai/                   # AI Analysis Engine
β”‚   └── AiEngine.kt
β”œβ”€β”€ automation/           # Workflow & Scheduling
β”‚   β”œβ”€β”€ AutomationEngine.kt
β”‚   β”œβ”€β”€ WorkflowExecutor.kt
β”‚   └── SchedulerManager.kt
β”œβ”€β”€ models/               # 16 Data Models
β”‚   β”œβ”€β”€ ScanResult.kt
β”‚   β”œβ”€β”€ Tool.kt
β”‚   β”œβ”€β”€ AiAnalysis.kt
β”‚   └── ...
β”œβ”€β”€ services/             # Background Services
β”‚   └── ScanService.kt
β”œβ”€β”€ termux/               # Termux Integration
β”‚   β”œβ”€β”€ TermuxManager.kt
β”‚   β”œβ”€β”€ TermuxTools.kt
β”‚   └── TermuxInstaller.kt
β”œβ”€β”€ tools/                # 20+ Security Tools
β”‚   β”œβ”€β”€ VulnerabilityScanner.kt
β”‚   β”œβ”€β”€ OsintTools.kt
β”‚   β”œβ”€β”€ WebAttackTools.kt
β”‚   β”œβ”€β”€ AdditionalTools.kt
β”‚   β”œβ”€β”€ NativeToolExecutor.kt
β”‚   └── ...
β”œβ”€β”€ utils/                # Utility Classes
β”‚   β”œβ”€β”€ NetworkUtils.kt
β”‚   β”œβ”€β”€ PreferencesManager.kt
β”‚   └── ConfigManager.kt
└── workers/              # Background Workers
    └── ScheduledScanWorker.kt

Tech Stack

  • Language: Kotlin (primary), Java 17 target
  • Platform: Android SDK 34 (compileSdk/targetSdk), minSdk 24 (Android 7.0+)
  • Build System: Gradle with Kotlin DSL
  • Networking: OkHttp 4.12.0, Java Socket, SSLContext
  • JSON: Gson 2.10.1
  • Async: Kotlinx Coroutines 1.7.3
  • UI: Material Design 3, AndroidX (AppCompat, RecyclerView, CardView, Navigation)
  • Background: WorkManager 2.9.0, Foreground Services

Requirements

  • Android 7.0 (API 24) or higher
  • Internet permission (required)
  • Access Network State permission (required)

Building the Project

Using Android Studio

  1. Open the project in Android Studio
  2. Sync project with Gradle files
  3. Build and run on your device or emulator

Using Command Line

./gradlew assembleDebug

Installation

  1. Build the APK using Android Studio or Gradle
  2. Enable "Unknown sources" in Android settings
  3. Install on your Android device:
    adb install app/build/outputs/apk/debug/app-debug.apk

Usage

  1. Launch the app and accept the legal disclaimer
  2. Use F1-F12 function keys or tap cards to access tool categories
  3. Enter the target information when prompted
  4. View detailed scan results with findings and recommendations
  5. Results are saved to history for later review
  6. Create workflows for automated testing

Security & Legal Notice

This application is designed for ethical hacking and security testing purposes only. Users must:

  • βœ… Obtain proper authorization before testing any system
  • βœ… Only test systems they own or have explicit permission to test
  • βœ… Comply with all applicable laws and regulations
  • βœ… Use this tool responsibly

⚠️ Unauthorized access to computer systems is illegal. The developers assume no liability for misuse of this tool.

API Rate Limits

External APIs used have rate limits:

  • Google DNS: 1000 requests/day (unofficial)
  • ip-api.com: 45 requests/minute (free tier)
  • HackerTarget: 100 requests/day (free tier)
  • crt.sh: Unlimited but may throttle

Consider configuring your own API keys for production use.

License

This project is for educational purposes. Use responsibly.

Disclaimer

This tool is provided "as is" without warranty of any kind. Use at your own risk.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages